Q1. Mark works as a Security Officer for TechMart Inc. The company has a Windows-based network. He has bees assigned a project for ensuring the safety of the customer's money and information, not to mention the company's reputation. The company has gone through a security audit to ensure that it is in compliance with industry regulations and standards. Mark understands the request and has to do his due diligence for providing any information the regulators require as they are targeting potential security holes. In this situation, his major concern is the physical security of his company's system. Which of the following actions will Mark take to ensure the physical security of the company's desktop computers?
A. Call a team member while behaving to be someone else for gaining access to sensitive information.
B. Develop a social awareness of security threats within an organization.
C. Use group policies to disable the use of floppy drives or USB drives.
D. Provide protection against a Distributed Denial of Services attack.
Answer: C
Q2. Which of the following types of Network Address Translation (NAT) uses a pool of public IP addresses?
A. Static NAT
B. Port Address Translation (PAT)
C. Dynamic NAT
D. Cache NAT
Answer: C
Q3. Which of the following are the main features of a key logger? Each correct answer represents a complete solution. Choose all that apply.
A. It can be delivered via FTP or e-mail.
B. It can record all keystrokes.
C. It can capture all screenshots.
D. It can detect viruses on the computer.
Answer: ABC
Q4. Which of the following is used to create a secured connection over an unsecured network?
A. TCP/IP protocol
B. Virtual Private Network (VPN)
C. Single Sign-on (SSO)
D. Kerberos
Answer: B
Q5. By default, what level of security is set for the Local intranet zone?
A. High-Medium
B. Medium-Low
C. High
D. Low
Answer: B
Q6. Which of the following helps prevent security failures?
A. Social engineering
B. Denial-of-Service attack
C. Attack surface reduction
D. Snooping
Answer: C
Q7. Which of the following protects against unauthorized access to confidential information via encryption and works at the network layer?
A. Firewall
B. NAT
C. IPSec
D. MAC address
Answer: C
Q8. Which of the following are the types of group scopes? Each correct answer represents a complete solution. Choose all that apply.
A. Global
B. Domain Users
C. Universal
D. Domain local
Answer: ACD
Q9. Which of the following is a name that identifies a particular 802.11 wireless LAN?
A. MBSA
B. IBSS
C. MAC
D. SSID
Answer: D
Q10. Which of the following is a tool that can be used to evaluate the servers having vulnerabilities that are related to the operating system and installed software?
A. DNS dynamic update
B. Windows Software Update Services
C. Read-Only domain controller (RODC)
D. Microsoft Baseline Security Analyzer
Answer: D